Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 19 Feb 2010 08:47:50 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel information leak via userspace
 USB interface

On 02/19/2010 12:53 AM, Steven M. Christey wrote:
>
> On Thu, 18 Feb 2010, Marcus Meissner wrote:
>
>> Are we considering "giving desktop local users unintended rights"
>> a security issue or not?
>
> from a CVE purist perspective, if the security model is that "users with
> physical access should not be able to read portions of kernel memory"
> then a violation of that is technically a vulnerability, even if the
> attack complexity is high - assuming that there isn't already some
> easier way that the attacker can get the same results through legitimate
> means. Being able to crash the system by plugging in a USB device (for
> example) is about as easy as the defenestration exploit - i.e. throwing
> the computer out the window - so in that case I wouldn't view it as a
> vulnerability. If someone with physical access can read the kernel
> memory that's being leaked, if don't already own the box, that seems a
> little more like a vulnerability to me.

Thanks for clarifying!

Eugene
-- 
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ